G DATA Business Solutions Reference Guide

G DATA Business Solutions Reference Guide

G DATA Business Solutions Reference Guide G DATA Software AG | October 2017 G DATA Business Solutions Reference Guide Contents Introduction .......................................................................................................................... 6 Section A: Planning and deployment ........................................................................................ 7 1. Network and client management ....................................................................................... 7 1.1. Network layout ................................................................................................................................ 7 1.2. Security components ..................................................................................................................... 12 2. Choosing a solution ........................................................................................................ 13 2.1. G DATA business solutions ............................................................................................................ 13 2.2. System requirements .................................................................................................................... 14 2.3. Licensing ........................................................................................................................................ 15 3. Installation scenarios ..................................................................................................... 16 3.1. Local deployment .......................................................................................................................... 16 3.2. Managed Endpoint Security and Managed Endpoint Security Powered by Microsoft Azure ..... 22 4. Deployment ................................................................................................................... 23 4.1. Preparation .................................................................................................................................... 23 4.2. Clean installation ........................................................................................................................... 24 4.3. Upgrade installation ...................................................................................................................... 27 4.4. Network configuration .................................................................................................................. 29 4.5. Initial configuration ....................................................................................................................... 30 4.6. Server updates and registration.................................................................................................... 32 4.7. Server database backup and restore ............................................................................................ 33 4.8. Client deployment ......................................................................................................................... 35 4.9. Finalizing deployment ................................................................................................................... 43 4.10. Subnet server(s) ............................................................................................................................. 44 5. Remote administration ................................................................................................... 46 5.1. Desktop application....................................................................................................................... 46 5.2. Browser .......................................................................................................................................... 47 5.3. Mobile ............................................................................................................................................. 49 5.4. MasterAdmin .................................................................................................................................. 50 2 Copyright © 2017 G DATA Software AG Contents Section B: Using G DATA business solutions ............................................................................. 51 6. Dashboard and monitoring .............................................................................................. 51 6.1. Overview, Dashboard and Statistics ............................................................................................. 51 6.2. Reports and Alarms ....................................................................................................................... 54 6.3. ReportManager .............................................................................................................................. 56 7. Managing clients ............................................................................................................ 58 7.1. Using groups .................................................................................................................................. 58 7.2. Integrating Active Directory .......................................................................................................... 59 7.3. Signature and program file updates ............................................................................................. 60 7.4. End user security permissions ....................................................................................................... 64 7.5. Performance .................................................................................................................................. 65 7.6. Malware Information Initiative ...................................................................................................... 66 7.7. Managing Linux/Mac clients .......................................................................................................... 66 7.8. Removing a client .......................................................................................................................... 67 8. Real time protection ....................................................................................................... 68 8.1. Internet traffic scans ...................................................................................................................... 69 8.2. Monitor ........................................................................................................................................... 71 8.3. Performance .................................................................................................................................. 74 8.4. Operating system security ............................................................................................................. 75 8.5. Web proxy protection .................................................................................................................... 77 9. On demand protection .................................................................................................... 78 9.1. Idle scan ......................................................................................................................................... 78 9.2. Scan jobs ........................................................................................................................................ 79 9.3. Exceptions ...................................................................................................................................... 85 9.4. Local scan jobs ............................................................................................................................... 86 10. Handling a malware infection .......................................................................................... 87 10.1. Automated detection and mitigation ........................................................................................... 87 10.2. Extended mitigation ...................................................................................................................... 89 10.3. Analysis .......................................................................................................................................... 90 11. Mobile device management ............................................................................................. 93 11.1. Android ........................................................................................................................................... 93 11.2. iOS .................................................................................................................................................. 98 Copyright © 2017 G DATA Software AG 3 G DATA Business Solutions Reference Guide 12. Backups ....................................................................................................................... 102 12.1. Managing backups ....................................................................................................................... 103 12.2. Create a backup ........................................................................................................................... 104 12.3. Restore a backup ......................................................................................................................... 109 13. Firewall ........................................................................................................................ 111 13.1. Managing firewall clients ............................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    176 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us